A global internet puzzle that requires advanced computer skills to solve has reopened online.
It is the third year running that the mysterious Cicada 3301 has appeared, with no clues as to who is behind the puzzle.
Some believe it is a recruitment process for a government spy agency, while others believe it could be the work of a bank.
The puzzle takes people on a treasure trail around the so-called dark net.
This year’s competition was announced via a Twitter account to which was attached an image file with the following message: “Hello. Epiphany is upon you. Your pilgrimage has begun. Enlightenment awaits. Good luck. 3301.”
Thousands of fans have been drawn into the competition and have eagerly awaited its relaunch.
This year’s iteration already appears to be fiendishly difficult, requiring understanding of OutGuess, a complex steganography tool.
Steganography hides data inside images, and is often used for nefarious purposes by terrorists and paedophiles.Anglo-Saxon runes
Computer scientist Prof Alan Woodward is one of those who has previously taken part in the competition.
“The puzzles are very complicated and require knowledge of steganography, cryptography as well as obscure existential texts,” he told the BBC.
Previous competitions have taken people on both a mental and physical journey, encompassing cyber-punk literature, Anglo-Saxon runes and the work of occultist and magician Aleister Crowley.
Last year, part of the treasure trail also required people to travel to physical locations to decode QR codes posted on telegraph poles dotted around the US.
Now that the competition is widely known about there has been a spate of fakes but for those with the necessary knowledge it is easy to spot the real thing.
“The group uses a PGP signature and put up a key signed with this,” explained Prof Woodward.
Speculation about who is behind the puzzle has been gaining momentum as the competition attracts more publicity.
“It could be a criminal organisation looking for recruits or it could be a start-up looking to set up a new crypto-currency, possibly even a bank,” said Prof Woodward.
“Lots of people think it could be a government agency and that looks reasonably likely as whoever is being recruited isn’t telling anybody afterwards,” he added.
The Latest on: Steganography
via Google News
The Latest on: Steganography
- Platinum APT’s new Titanium backdoor mimics popular PC software to stay hiddenon November 8, 2019 at 7:56 am
In recent years, the hacking group has become linked to the use of novel attack techniques, such as the abuse of a now-deprecated Windows feature called hotpatching and fileless code deployment, as ...
- Shakespeare In A Zip In A RAR, Hidden In An Image On Twitteron November 5, 2019 at 4:00 pm
Steganography involves hiding data in something else — for example, encoding data in a picture. [David Buchanan] used polyglot files not to hide data, but to send a large amount of data in a single ...
- Traceable Quantum Steganography Scheme Based on Pixel Value Differencingon October 22, 2019 at 2:29 am
A novel and traceable quantum steganography scheme based on pixel value differencing (PVD) is proposed. In the proposed scheme, a quantum cover image is divided into non-overlapping blocks of two ...
- Criminals are hiding malware inside WAV fileson October 21, 2019 at 5:00 am
You know what's making a comeback? Hackers hiding malicious code in non-malicious file types. Called steganography, the process is simple in theory – hackers can use regular files, like photos, for ...
- WAV files are being used to hide malicious codeon October 21, 2019 at 3:22 am
Malware creators are using WAV audio files to hide malicious code. Steganography – the art of hiding information within another file – has been used for years by malicious parties, but has usually ...
- File Compression By Steganographyon October 19, 2019 at 1:03 am
[Labunsky] decided to put to use his knowledge of steganography to create a wholly unique form of file compression, perhaps one that may gain greater notoriety among other information theorists.
- Malicious WAV files can be used to deliver malware and cryptominerson October 18, 2019 at 3:04 am
WAV files with the malware hidden in them using steganography played as normal, giving no indication that there was anything wrong with them. The malware-riddled files are sent out to victims via ...
- WAV audio files are now being used to hide malicious codeon October 16, 2019 at 9:01 am
The technique is known as steganography-- the art of hiding information in plain sight, in another data medium. In the software field, steganography -- also referred to as stego -- is used to describe ...
- LokiBot Gets Sneakier With Steganographyon August 7, 2019 at 1:40 pm
The LokiBot malware continues to evolve and is now using steganography to cloak its malicious files, according to a report from Trend Micro this week. Recently highlighted as one of the top three ...
- Are Stock Photos a Threat to Cybersecurity?on June 20, 2019 at 5:09 am
One devastating technique that is increasing in popularity amongst canny cybercriminals is steganography, where information is concealed in the pixels of images (for example, in the colour and ...
via Bing News